Algoritmo para transmisión de información segura en dispositivos NFC - Algorithm for secure information transmission in NFC devices

Autores/as

  • Héctor Caballero Hernández Universidad Autónoma del Estado de México
  • Vianney Muñoz Jiménez Universidad Autónoma del Estado de México
  • Marco Antonio Ramos Corchado Universidad Autónoma del Estado de México
  • Marcelo Romero Huertas Universidad Autónoma del Estado de México

DOI:

https://doi.org/10.32870/recibe.v7i2.109

Palabras clave:

Criptografía, esteganografía, Vernam, Arduino, matrices

Resumen

En este artículo se presenta un nuevo algoritmo para la transmisión de información segura en dispositivos NFC (Near Field Communication), debido a la facilidad de uso de esta tecnología, se han desarrollado aplicaciones para la adquisición de bienes y servicios, así como implementaciones de redes de sensores en ecosistemas naturales, aplicaciones médicas, entre otras. Por lo tanto, es de gran importancia implementar mecanismos de seguridad que permitan el resguardo de información transmitida vía NFC. El algoritmo que se presenta, manipula técnicas de esteganografía combinadas con técnicas de criptografía para garantizar la transmisión de información segura en los dispositivos NFC.Abstract: This article presents a new algorithm for the transmission of secure information in NFC (Near Field Communication) devices, due to the ease use of this technology, applications have been developed for the acquisition of goods and services, as well as network implementations of sensors in natural ecosystems, medical applications, among others. Therefore, it is of great importance for implement security mechanisms that allow the protection of information transmitted via NFC. The algorithm presented consists of manipulating steganography techniques combined with cryptography techniques guarantee the transmission of secure data in NFC devices.Keywords: Cryptography, steganography, Vernam, Arduino, matrix.

Citas

Akyildiz, I. F., Su, W., Sankarasubramaniam, Y. & Cayirci, E. (2002). A Survey on Sensor Networks. Common. 102-114.

Al Husainy, M. A. F. (2012). Message Segmentation to Enhance the Security of LSB Image Steganography.

International Journal of Advanced Computer Science and Applications. 57-62.

Chappleand, M. & Solomon, M. (2005). Information Security Illuminated. Primera edición. Estados Unidos: Jones and Bartlett Publishers.

Childs, J. R. (2000). General Solution of the ADFGVX Cipher System. Estados Unidos: Aegean Park Press.

Choudry, K. N. & Wanjari, A. (2015). A Survey Paper on Video Steganography. IJCSIT.

Coskun, V., Ok, K. & Ozdenizci, B. (2012). Near Field Communication (NFC): From Theory to Practice. Primera edición. UK: John Wiley and Sons.

Coskun, V., Ok, K. & Ozdenizci, B. (2013). Professional NFC Application Development for Android Primera edición. UK: John Wiley Sons, Wrox.

Delfs, D. & Helmut, H. (2007). Introduction to Cryptography: Principles and applications. Segunda edición. Springer & Business Media.

Dhruw, T. & Tiwari, D. N. (2016). Different Method used in Pixel Value Differencing Algorithm. IOSR Journal of Computer Engineering. 102–109.

Di Laura, C., Pajuelo, D., and Kemper, G. (2016). A novel steganography technique for SDTV H.264 AVC encoded video. International Journal of Digital Multimedia Broadcasting. 1–9.

Djebba, F., Ayad, B., Meraim, K. A. & Hamam, H. (2012). Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing. 1–16.

Dragan, A. (2015). Encryptation and Decryption on Messages on Android using NFC Tags. Journal of Mobile, Embedded and Distributed Systems. 130-135.

Dworkin, M. J., Barker, E. B., Nechvatal, R. J., Foti, J., Bassham, L. E., Roback, E. & Dray, J. F. (2016). Advance Encryptatio Standard (AES). NIST publications.

ECMA. (2018). Near Field Communication Interface and Protocol 1 (NFCIP-1). ECMA International. Diponible: http://www.ecma-international.org/publications/standards/Ecma-340.htm. (Consultado 5-9-2018).

Haselsteiner, E. & Breitfub, K. (2016). Security in Near Field Communication (NFC). Philips Semiconductors.

Kavya, S., Pavithra, K., Rajaram, S., Vahini, M. & Harini, N. (2014). Vulnerability Analysis and Security System For NFC-Enabled Mobile Phones. International Journal of Scientific and Technology Research.

Kim, H. (2016). A study on the Cryptographic Algorithm for NFC. Indian Journal of Science and Technology. 1-5.

Mazurczyk, W. & Caviglione, L. (2014), Steganography in Modern Smartphones and Mitigation Techniques. Polish National Science Center.

Mishra, B. & Tripathi, M. (2015). Information security though digital image Steganography using multilevel and Compression technique. International Research Journal of Computer Science IRJCS. 23-31.

Muke, S., Shinde, S., Mistry, C. & Jawalkar, P. (2015). NFC Hardware Device Based Access Control System using Information Hiding. International Journal of Innovative Research in electrical, electronics, Instrumentation and Control Engineering. 69-72.

Rivest, R., Shamir, A. & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. 120–126.

Sankpal, L. J., Mundhe, S., Kotwal M., Machale, P. & Malchikare S. (2017). NFC Based Access Control System Using Image Hiding. International Journal of Innovative Research in Computer and Communication Engineering. 5352-5355.

Schürmann, D., Dechand, S. & Wolf, L. (2017) OpenKeychain: An Architecture for Cryptography with Smart Cards and NFC Ring son Android”, ACM Interact Mob. Werable Ubiquiotous Tech. 1-24.

Tian, H., Qin, J., Huang, Y., Chen, Y., Wang, T., Liu, J., & Cai, Y. (2015). Optimal matrix embedding for Voice-over-IP steganography. College of Computer Science and Technology. National Huaqiao University China. 33-43.

Tripathi, D., Singh, Y. K. & Singh, R. (2016). A survey on Image Steganography With its Related Technique and its Types. IJSART. 163-169.

Vaithiyanathan, V., Karthikeyan, B., Anischin Raj, M. M., Reddy, R., Priyanka, S. & Abinaya, K. (2015). An Amalgamated Approach of cryptography and steganography using IWT and Random pixel selection for secure transmission. ARPN Journal of Engineering and Applied Sciences. 2352-2357.

Vernam, G. S. (1926). Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications. Journal of the IEEE. 109-115.

Yi, W. J. and Saniie, J. (2013). Smart Mobile System for Body Sensor Network. Estados Unidos. Proceedings of the IEEE International Conference on Electro/Information Technology (EIT). 1-4.

Descargas

Publicado

2018-10-31

Cómo citar

Caballero Hernández, H., Muñoz Jiménez, V., Ramos Corchado, M. A., & Romero Huertas, M. (2018). Algoritmo para transmisión de información segura en dispositivos NFC - Algorithm for secure information transmission in NFC devices. ReCIBE, Revista electrónica De Computación, Informática, Biomédica Y Electrónica, 7(2), 47–64. https://doi.org/10.32870/recibe.v7i2.109

Número

Sección

Computación e Informática